What is a release methodology? Why is version control important? What are some k
ID: 3574678 • Letter: W
Question
What is a release methodology? Why is version control important? What are some key issues that you must address when considering data backup and recovery? What are the six security levels? Provide examples of threat categories, attacker profiles, and types of attacks. What is a release methodology? Why is version control important? What are some key issues that you must address when considering data backup and recovery? What are the six security levels? Provide examples of threat categories, attacker profiles, and types of attacks. What is a release methodology? Why is version control important? What are some key issues that you must address when considering data backup and recovery? What are the six security levels? Provide examples of threat categories, attacker profiles, and types of attacks.Explanation / Answer
Release methodology is proccess of selecting most efficient and more understandebel release from all relasses for best quality product.
In an release methodology non-critical change held till they can implemented at same time.
Any changes did in system it will be documented and it used as new version for system this is maintenance release.
At the time of using release methodology numbering for version is used to distinguish from other versions.
Release methodology also reduce the documentation problem version control track the release and when versions are released it will be archived by librarian of system who is responsible for all old and new versions.
In version control there is facility to rollback the changes if any major system failure occurs.
Some of version control tools are svn and git that is take care of all releases.
Key issues that you must address when considering data backup and recovery
1) network failure
2) media failure
3) statement failure
4) user process failure and user errors
5) instance failure
Security levels
1) physical security.
2) network security.
3) application security.
4) file security.
5) user security.
6) procedural security.
Types of threat:-
1) physical
2) electrical
3) environmental
4) maintenance
Type of attacks:-
1) reconnaissance attack
2) active attack
3) passive attack
4) insider attack
5) phishing attack
6) distributed attack
7) spoof attack
8) hijack attack
9) buffer overflow attack
10) packet capturing attack
11) ping sweep attack
12) dns query attack
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.